Light trust management for routing in wireless sensor networks

被引:0
作者
Une gestion économe de la confiance pour le routage dans des réseaux de capteurs sans fil
机构
[1] LITIS, MIU, INSA de Rouen, Saint-Étienne du Rouvray
[2] LCIS, Université de Grenoble, Valence
来源
Vercouter, L. (laurent.vercouter@insa-rouen.fr) | 1600年 / Lavoisier卷 / 26期
关键词
Secure routing protocol; Trust management; wireless sensor networks;
D O I
10.3166/RIA.26.543-568
中图分类号
学科分类号
摘要
Communication in Wireless Sensor Networks requires the implementation of decentralized algorithms for routing tasks. The global issue of such algorithms relies directly on the correct behavior of the network nodes. This increases the vulnerability of the system regarding malicious intrusions or local failures. We propose in this article decentralized trust mechanisms in order to detect and avoid deviant nodes. The trust management algorithms follow an original approach as they are suited to a context of limited resources in energy, memory and communication. They are thus suited to be used in multi-agent systems where authentication is not possible, and in which the agents' identity is uncertain. We apply these mechanisms to the MWAC model. © 2012 Lavoisier.
引用
收藏
页码:548 / 568
页数:20
相关论文
共 27 条
[1]  
Babu S.S., Raha A., Naskar M.K., Article: Trustworthy route formation algorithm for wsns, International Journal of Computer Applications, 27, 5, pp. 35-39, (2011)
[2]  
Boukerch A., Xu L., El-Khatib K., Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 30, 11-12, pp. 2413-2427, (2007)
[3]  
Castelfranchi C., Engineering social order, Proceedings of the 2nd International Workshop on Engineering Societies in the Agent's World (esaw'00), (2000)
[4]  
Castelluccia C., Francillon A., Protéger les réseaux de capteurs sans fil., 6e Symposium sur la Sécurité des Technologies de l'Information et des Communications, pp. 1-11, (2008)
[5]  
Chen H., Wu H., Hu J., Gao C., Agent-based trust management model for wireless sensor networks, International Conference on Multimedia and Ubiquitous Engineering, pp. 150-154, (2008)
[6]  
Dai H., Jia Z., Qin Z., Trust evaluation and dynamic routing decision based on fuzzy theory for manets, Journal of Sofware, 4, 10, pp. 1091-1101, (2009)
[7]  
Despotovic Z., Aberer K., P2P reputation management: Probabilistic estimation vs. Social networks, Computer Networks, 50, 4, pp. 485-500, (2006)
[8]  
Fournel N., Minier M., Ubeda S., Survey and benchmark of stream ciphers for wireless sensor networks, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4462, pp. 202-214, (2007)
[9]  
Griffiths N., Jhumka A., Dawson A., Myers R., A simple trust model for on-demand routing in mobile ad-hoc networks, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 162, pp. 105-114, (2008)
[10]  
Han G., Choi D., Lim W., A novel sensor node selection method based on trust for wireless sensor networks, International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2397-2400, (2007)